Webcast: Introduction to Pentesting w/ Mike Felch
The post Webcast: Introduction to Pentesting w/ Mike Felch appeared first on Black Hills Information Security, Inc..
Mike Felch // The Hunt for Initial Access With the default disablement of VBA macros originating from the internet, Microsoft may be pitching a curveball to threat actors and red [β¦]
The post Rogue RDP β Revisiting Initial Access Methods appeared first on Black Hills Information Security, Inc..
Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester [β¦]
The post Podcast: Weaponizing Corporate Intel. This Time, Itβs Personal! appeared first on Black Hills Information Security, Inc..
Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester [β¦]
The post Webcast: Weaponizing Corporate Intel. This Time, Itβs Personal! appeared first on Black Hills Information Security, Inc..
Mike Felch// How to Purge Google and Start Over β Part 1 Brief Recap In part 1, we discussed a red team engagement that went south when the Google SOC [β¦]
The post How to Purge Google and Start Over β Part 2 appeared first on Black Hills Information Security, Inc..
Mike Felch// A Tale of Blue Destroying Red Let me start by sharing a story about a fairly recent red team engagement against a highly-secured technical customer that didnβt end [β¦]
The post How to Purge Google and Start Over β Part 1 appeared first on Black Hills Information Security, Inc..
For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate [β¦]
The post PODCAST: RDP Logging Bypass and Azure Active Directory Recon appeared first on Black Hills Information Security, Inc..
For this webcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate [β¦]
The post WEBCAST: RDP Logging Bypass and Azure Active Directory Recon appeared first on Black Hills Information Security, Inc..
Mike Felch // With so many Microsoft technologies, services, integrations, applications, and configurations it can create a great deal of difficulty just to manage everything. Now imagine trying to secure [β¦]
The post Red Teaming Microsoft: Part 1 β Active Directory Leaks via Azure appeared first on Black Hills Information Security, Inc..
Mike Felch // More and more organizations are rolling out mandatory 2FA enrollment for authentication to external services like GSuite and OWA. While this is great news because it creates [β¦]
The post Stealing 2FA Tokens on Red Teams with CredSniper appeared first on Black Hills Information Security, Inc..
Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode hereΒ and look at the slides [β¦]
The post PODCAST: Highly Caffeinated InfoSec appeared first on Black Hills Information Security, Inc..
Beau Bullock & Mike Felch// Ways to Learn More, Network, and Wake Up Your Inner Hacker Whether you are brand new to InfoSec or a skilled veteran there are ways [β¦]
The post WEBCAST: Highly Caffeinated InfoSec appeared first on Black Hills Information Security, Inc..
Mike Felch and Beau Bullock// Cryptocurrency conversations are everywhere you look! Mike Felch and Beau Bullock were so interested they started their own podcast about the topic. Weβre excited to [β¦]
The post WEBCAST: A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems appeared first on Black Hills Information Security, Inc..
Beau Bullock & Michael Felch // Source:Β https://chrome.google.com/webstore/detail/google-calendar-by-google/gmbgaklkmjakoegficnlkhebmhkjfich Overview Google Calendar is one of the many features provided to those who sign up for a Google account along with other popular [β¦]
The post Google Calendar Event Injection with MailSniper appeared first on Black Hills Information Security, Inc..
Mike Felch // MeetΒ βThe Boxβ Bomb For the last few years at the security conference DEF CON in Las Vegas, the Tamper Resistant Village has hosted a challenging contest called [β¦]
The post Defusing a Bomb Through Trigger Bypasses and Sensors appeared first on Black Hills Information Security, Inc..